Anonymous Online: The Ultimate Guide to Online Privacy

Learn how to stop websites from tracking you, use TOR and VPNs, encrypt your chats and calls & send emails anonymously
4.5 (19 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
81 students enrolled
25% off
Take This Course
  • Lectures 18
  • Length 1.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 11/2015 English

Course Description

Every day, advertising companies track our every move and bombard us with "relevant" advertisements at the expense of our privacy, ISPs and government entities in some countries stop us from visiting social networking sites and other harmless sites that don't conform to their ideology by censoring online content and hackers try to steal our data and hack our accounts for their own gain or just for the lulz.

Packed with step-by-step tutorials, screencasts and presentations, this course will teach how to stay anonymous online, how to deter private and public entities from gathering data on you and how to safeguard your online privacy against hackers; without learning to code or acquiring a computer science degree in the process!

This course will empower you and make you feel safer online.

In this course, you will learn:

  • How private and public entities identify you online and how they store data on you to create a usage profile.
  • How your computer and web browser is leaking tons of personal information about you and what you can do to stop that
  • What proxy service and virtual private networks (VPNs) are and how to use them
  • How to install and use anonymising software and services to safeguard your online identity
  • How to view website that have been censored by your ISP or government
  • What is virtual machine and how you can use it to deal with suspicious file that could cause harm to your computer
  • How to send anonymous emails and more importantly not let companies use your email IDs to create your profile or sell your address to spammers
  • How to encrypt your online chats so no eavesdropper can read it
  • What services allow you to encrypt your phone calls and text messages and ensure the safety of the one device you cannot live without: your smartphone.
  • Bonus Content: Overview of an entire Operating System built around anonymity and online security.

What are the requirements?

  • How to use a PC/Mac
  • How to install softwares
  • How to browse the internet

What am I going to get from this course?

  • Stop websites from tracking you
  • Access blocked websites
  • Stop your computer and web browser from leaking your personal information
  • Use TOR to mask your identity online
  • Use VPNs for faster, safer online experience
  • Choose which country you want your online traffic to originate from
  • Send emails anonymously
  • Stop companies from selling your email address to spammers and cluttering up your inbox
  • Use virtual machines to deal with suspicious files without harming your computer
  • Encrypt your online chats so that eavesdroppers can't read them
  • Use services that encrypt your phone calls and text messages
  • Make it harder for hackers to compromise your system
  • Learn about an Operating System that is built with security and anonymity in mind

Who is the target audience?

  • Anybody who is bothered about the amount of information being gathered on them on a day-to-day basis by private and public entities
  • Anybody who is living in a region with unnecessary online censorship
  • Anybody who wants to be safer online
  • No programming knowledge required

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Introduction

This is the introductory lecture of the course that discusses who this course is for and the contents of this course

Section 2: How your computer is recognised online

This lecture will talk about what an IP address is, the difference between a private and public IP address, how to find your public IP address and what it reveals about you.


This lecture discusses what Domain Name Service (DNS) is and how it leads to revelation of your physical location and Internet Service Provider (ISP). We will also learn how to check for DNS leaks from your browser.

Section 3: Your Gateway to the Internet - The Browser

This lecture will demonstrate what sort of personal and private information your web browser is leaking and how you can do browser information leak tests online.


Here, we will modify the settings of our browser to safeguard our online privacy and make it tougher for companies and websites to glean information about us


Despite changing all the right settings and securing our browser, we will still require some browser extensions to improve the functionality of our browser and make it more secure against online advertisers and malicious websites. In this lecture, we will talk about a browser extension that can be used to stop all website scripts from running on your browser


In this lecture we will download and install a browser extension that shows you exactly what trackers reside in each website that you visit, their purpose and the provision to block them from tracking you


Here we will install a browser extension that enables SSL encryption for all websites that support them. This will encrypt all the data travelling to and from the website to your computer

Section 4: Softwares to hide your identity

Our first anonymising software suite. We will discuss The Onion Router (TOR), the basics of how it works, the type of people that use it, what it accomplishes as well as the disadvantages and limitations of using TOR


This lecture will demonstrate how to correctly install and use TOR to hide your public IP address and mask your identity on the World Wide Web.


Here we will be discussing what a Virtual Private Network (VPN) is, how it works and what it achieves along with the difference between VPN and TOR.


This tutorial will show how to install and run a particular VPN service and how to test whether it is correctly working or not.

Section 5: How to deal with suspicious files

In this lecture we will discuss what a virtual machine (VM) is, how to use VM softwares to run operating systems in a virtual environment and deal with suspicious files. This is to make sure that no malicious file can compromise our system

Section 6: Encrypted Communication

In this lecture we will talk about how to create a near anonymous email ID using a conventional email service provider and how to safeguard our inbox against spams by using special email services for various online accounts


In this lecture, we will learn to encrypt our Instant Messaging (IM) chats so that network sniffers and people eavesdropping on our network cannot read our chat


In this lecture we discuss a firm that provides softwares and services to encrypt our phone calls, video chat, messages and provide all-round protection to our smartphone communications.

Section 7: Bonus Content

Here is a bonus lecture that discusses an Operating System built from the ground up with security and anonymity in mind. This OS gained popularity after the famous whistleblower Edward Snowden lauded it for its security.

Section 8: Conclusion & Recap

Congratulation on completing this course. Here is a quick recap of everything that we learnt. Hope you enjoyed this course and learnt something useful. Thank you.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Shashank Sharma, Engineer, MBA, Teacher, Consultant

Possessing a varied background, having dabbled in computer programming and web designing, along with professional work experience in MEP project (controls and automation) as well as management consulting, Shashank is always keen on learning and teaching new skills that can be used to improve productivity, quality of life and add a little oomph to the resume.

Shashank has previously taught SAT II students and mentored Engineering Diploma students.

Shashank has a degree in engineering from the UK, is a recent graduate from a global top 10 B-School (Financial Times ranking, 2015) and is a voracious tech junkie.

Ready to start learning?
Take This Course